Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Traditional data architecture patterns are severely limited. To use these patterns, you have to ETL data into each tool--a cost-prohibitive process for making warehouse features available to all of your data. The lack of flexibility with these patterns requires you to lock into a set of priority tools and formats, which creates data silos and data drift. This practical book shows you a better way. Apache Iceberg provides the capabilities, performance, scalability, and savings that fulfill the promise of an open data lakehouse. By following the lessons in this book, you'll be able to achieve interactive, batch, machine learning, and streaming analytics with this high-performance open source format. Authors Tomer Shiran, Jason Hughes, and Alex Merced from Dremio show you how to get started with Iceberg. With this book, you'll learn: The architecture of Apache Iceberg tables What happens under the hood when you perform operations on Iceberg tables How to further optimize Iceberg tables for maximum performance How to use Iceberg with popular data engines such as Apache Spark, Apache Flink, and Dremio Discover why Apache Iceberg is a foundational technology for implementing an open data lakehouse.
The Cloud Secure Model for Medical Data in Healthcare is a cutting-edge solution designed to address the challenges of storing, managing, and safeguarding sensitive medical information in cloud environments. This model employs a multi-layered approach to ensure the confidentiality, integrity, and availability of patient data while adhering to stringent regulatory requirements like HIPAA.At its core, the model leverages robust encryption mechanisms to secure data at rest and in transit, rendering it unreadable to unauthorized users. Access controls and identity management protocols are meticulously implemented to restrict data access to authorized personnel only. User authentication is fortified through multi-factor authentication (MFA) to prevent unauthorized entry.To maintain data integrity, the model employs digital signatures and hashing techniques, making it possible to detect any unauthorized alterations to medical records. Additionally, the model integrates continuous monitoring and intrusion detection systems that promptly identify and respond to any suspicious activities within the cloud environment.The Cloud Secure Model also encompasses comprehensive data backup and disaster recovery strategies to ensure the availability of medical data even in the face of unexpected outages or disasters. Regular security audits, vulnerability assessments, and penetration testing are carried out to identify and rectify potential vulnerabilities proactively.The Cloud Secure Model for Medical Data in Healthcare redefines the storage and management of medical information by combining advanced encryption, access controls, data integrity measures, and continuous monitoring. This ensures that patient data remains confidential, unaltered, and accessible only to authorized individuals, ultimately enhancing the overall quality of healthcare services while upholding the highest standards of data security and privacy.
Transportation typically entails crucial "e;life-death"e; choices, delegating crucial decisions to an AI algorithm without any explanation poses a serious threat. Hence, explainability and responsible AI is crucial in the context of intelligent transportation. In Intelligence Transportation System (ITS) implementations such as traffic management systems and autonomous driving applications, AI-based control mechanisms are gaining prominence.Explainable artificial intelligence for intelligent transportation system tackling certain challenges in the field of autonomous vehicle, traffic management system, data integration and analytics and monitor the surrounding environment.The book discusses and inform researchers on explainable Intelligent Transportation system. It also discusses prospective methods and techniques for enabling the interpretability of transportation systems. The book further focuses on ethical considerations apart from technical considerations.
In an era driven by technological advancements, cloud computing has emerged as a transformative force, revolutionizing the way individuals, businesses, and organizations operate. This book, "Cloud Computing: Harnessing the Power of the Digital Skies," aims to provide a comprehensive guide to understanding and leveraging the potential of cloud computing. Whether you are a curious reader, an aspiring cloud professional, or an industry veteran seeking to deepen your knowledge, this book will equip you with the necessary tools and insights to navigate the cloud landscape confidently.Chapters included:Chapter 1: The Cloud Computing ParadigmChapter 2: Cloud Service ModelsChapter 3: Cloud Deployment ModelsChapter 4: Cloud Architecture and DesignChapter 5: Cloud Security and PrivacyChapter 6: Cloud Storage and DatabasesChapter 7: Cloud Networking and ConnectivityChapter 8: Cloud Migration and ManagementChapter 9: Emerging Trends in Cloud ComputingChapter 10: The Future of Cloud Computing
Explore the world of Kubernetes and learn the concepts needed to develop, deploy, and manage applications on this container orchestrator. This step-by-step development guide is designed for application developers and support members aiming to learn Kubernetes and/or prepare for interviews. All the concepts in the book are presented in Q&A format, with questions framed exactly the way they are asked in an interview, giving you a distinctive edge in interviews.Yoüll start by understanding how application development and deployment have evolved over the decades leading up to containerization. Yoüll then dive deep into core Kubernetes concepts, learning Kubernetes architecture, Kubernetes objects and workload resources, and how to exploit them to their full potential. Yoüll also learn Kubernetes deployment strategies and concepts related to rollout and rollback.Moving on, yoüll look at two very important aspects of any computing ecosystem: networking and storage. You will gain an understanding of access control in Kubernetes and how to manage a Kubernetes cluster using probes, resource quotas, taints, and tolerations. You will also get an overview of Docker and review Docker and Kubernetes best practices. Finally, you will learn about the kubectl command line tool.What You Will LearnLearn about basic and advanced Kubernetes objects and workload resourcesMaster important concepts such as namespaces, selectors, annotations, and access controlUnderstand the Kubernetes networking and storage systemManage a Kubernetes cluster with the help of probes, resource quotas, limits, and taintsWho This Book Is For Application developers and technical managers¿both on the development and support sides, beginner and intermediate Kubernetes practitioners and aspirants, and those preparing for Kubernetes interviews.
Master Azure Well-Architected Framework and improve your optimization skills by enhancing the quality of your workloadsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn Well-Architected Framework from a cloud solution architect and an official Microsoft trainerOptimize your workloads in Azure by following Microsoft recommended best practicesUse reference architecture and Microsoft tests to conduct Well-Architected Framework (WAF) assessmentBook Description:It's easy to learn and deploy resources in Microsoft Azure, without worrying about resource optimization. However, for production or mission critical workloads, it's crucial that you follow best practices for resource deployment to attain security, reliability, operational excellence and performance. Apart from these aspects, you need to account for cost considerations, as it's the leading reason for almost every organization's cloud transformation.In this book, you'll learn to leverage Microsoft Well-Architected Framework to optimize your workloads in Azure. This Framework is a set of recommended practices developed by Microsoft based on five aligned pillars; cost optimization, performance, reliability, operational excellence, and security. You'll explore each of these pillars and discover how to perform an assessment to determine the quality of your existing workloads. Through the book, you'll uncover different design patterns and procedures related to each of the Well-Architected Framework pillars.By the end of this book, you'll be well-equipped to collect and assess data from an Azure environment and perform the necessary upturn of your Azure workloads.What You Will Learn:Dive deep into the Azure Well-Architected FrameworkExplore the differences between Cloud Adoption Framework and Well-Architected FrameworkUnderstand the pillars of the Well-Architected FrameworkDiscover varied techniques to improve the cost profile of your workloadOptimize your workflows using Azure Advisor and its scorePlan and prioritize the implementation of security recommendations from WAF assessmentsWho this book is for:This book is for developers, cloud solution architects, cloud administrators, and professionals experienced in design, implementation, and management of Azure resources. Professionals looking to learn cloud optimization or switch to a new role related to architecture can benefit from this book. An intermediate level understanding of the Microsoft Azure platform and services is a must. Experience in implementing or designing solutions in Azure is a plus but not mandatory.
Conduct impact measurement and outcomes evaluation, with a specific focus on nonprofits, using Salesforce Nonprofit Cloud (aka Salesforce for Nonprofits). As funding grows more challenging for nonprofits, having a robust technology system in place allows nonprofits to better seek out funding and receive more when they do. Readers of this book will be better positioned to ensure the long-term success of their organization and make maximum use of their technology.The book begins with an introduction to Salesforce and to Nonprofit Cloud for users who may be new to the platform. Next, you will learn the fundamentals of impact measurement and outcomes evaluation. You will understand why these are important and discover several frameworks that can be used to select outcomes that make sense for your organization to prove that its work is successful. These frameworks include Social Return on Investment (SROI), Cost-Benefit Analysis (CBA), and Pre and Post Comparison (and others).You will use your chosen framework to develop a logic model or theory of change which demonstrates how the work that nonprofits do translates into the outputs and outcomes that clients experience and that nonprofits seek funding to deliver. After covering the theory, author Dustin MacDonald teaches you how to translate the framework you chose into Salesforce. You will learn how to create reports, dashboards, formula fields, roll up summaries, and other basic Salesforce tools in order to collect the information you need to validate your framework.This book also demonstrates how to report on the outcomes you have achieved, tweak results to improve performance, and see the entire end-to-end experience in practice through a set of case studies. The book concludes with a discussion of advanced tools and techniques available inside Salesforce, such as Einstein Prediction Builder, as well as information on how you can immediately apply what you have learned to your own organization.What You Will LearnUnderstand how to use Nonprofit Cloud to collect and analyze dataKnow how to create a theory of change that shows your impactBecome adept at working with impact measurement frameworksBuild everything you need in Salesforce without writing a single line of codeTurn your insights into new funding to keep your organization strongWho This Book Is ForSalesforce administrators, nonprofit staff members, and others working at nonprofits who are required to conduct impact measurement and outcomes evaluation. Additionally, business analysts and technical architects who are designing and implementing solutions for nonprofits at implementation partners will benefit from this book.
This book presents a collection of peer-reviewed best selected research papers presented at the First International Conference on Smart and Sustainable Technologies (ICSST 2021), organized by Department of ECE, GIET University, Gunupur, Rayagada, Odisha, India, during December 16-18, 2021. The proceedings of the conference have a special focus on the developments of local tribe and rural people using smart and sustainable technologies. It is an interdisciplinary platform for researchers, practitioners, and educators as well as NGO workers who are working in the area of web engineering, IoT and cloud computing, Internet of Everything, data science, artificial intelligence, machine learning, computer vision, and intelligent robotics, particularly for the rural and tribal development.
This book is your practical and comprehensive guide to learning Google Cloud Platform (GCP) for data science, using only the free tier services offered by the platform.Data science and machine learning are increasingly becoming critical to businesses of all sizes, and the cloud provides a powerful platform for these applications. GCP offers a range of data science services that can be used to store, process, and analyze large datasets, and train and deploy machine learning models.The book is organized into seven chapters covering various topics such as GCP account setup, Google Colaboratory, Big Data and Machine Learning, Data Visualization and Business Intelligence, Data Processing and Transformation, Data Analytics and Storage, and Advanced Topics. Each chapter provides step-by-step instructions and examples illustrating how to use GCP services for data science and big data projects.Readers will learn how to set up a Google Colaboratory account and run Jupyternotebooks, access GCP services and data from Colaboratory, use BigQuery for data analytics, and deploy machine learning models using Vertex AI. The book also covers how to visualize data using Looker Data Studio, run data processing pipelines using Google Cloud Dataflow and Dataprep, and store data using Google Cloud Storage and SQL.What You Will LearnSet up a GCP account and projectExplore BigQuery and its use cases, including machine learningUnderstand Google Cloud AI Platform and its capabilities Use Vertex AI for training and deploying machine learning modelsExplore Google Cloud Dataproc and its use cases for big data processingCreate and share data visualizations and reports with Looker Data StudioExplore Google Cloud Dataflow and its use cases for batch and stream data processing Run data processing pipelines on Cloud DataflowExplore Google Cloud Storageand its use cases for data storage Get an introduction to Google Cloud SQL and its use cases for relational databases Get an introduction to Google Cloud Pub/Sub and its use cases for real-time data streamingWho This Book Is ForData scientists, machine learning engineers, and analysts who want to learn how to use Google Cloud Platform (GCP) for their data science and big data projects
Accelerate your career growth by building dynamic applications that function across all environments and cloud typesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn hybrid cloud architecture from experienced cloud and telco architectsAdapt and deploy emerging technologies like AI and ML in a standardized and secure mannerMaster communication between Kubernetes clusters and managementBook Description:Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud.You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you'll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You'll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises.By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.What You Will Learn:Design and build a foundation for hybrid cloud platformLeverage Kubernetes, containers, and GitOps for hybrid cloudUse architectural pattern blueprints to deliver applications on hybrid cloudEnable communication between applications hosted on different cloudsRollout zero-touch provisioning and monitoring in a hybrid architectureEnhance stability and scale up or down without rebuilding appsUnderstand principles of hybrid cloud security for application stackDesign cost-optimized systems based on the economics of hybrid cloudWho this book is for:This book is for cloud architects, developers, and DevOps engineers, responsible for delivering modern applications and deploying resources anywhere. Professionals aspiring to implement distributed and cloud solutions will also benefit from reading this book. Basic understanding of VM, containers, CI/CD and familiarity with public cloud and edge is a must.
Improve cloud security within your organization by leveraging AWS¿s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. Yoüll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization¿s needs. Yoüll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization¿s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not ¿one and done¿ Reinforce the need for updates and monitoring as a continued part of AWS securityWho This Book Is ForCloud computing architects, security professionals, security engineers, and software professionals interested in Cloud security.
This informative text/reference presents a detailed review of the state of the art in fog computing paradigm. In particular, the book examines a broad range of important cooperative and distributed computation algorithms, along with their design objectives and technical challenges.The coverage includes the conceptual fundamental of fog computing, its practical applications, cooperative and distributed computation algorithms using optimization, swarm intelligence, matching theory, and reinforcement learning methods. Discussions are also provided on remaining challenges and open research issues for designing and developing the efficient distributed computation solutions in the next-generation of fog-enabled IoT systems.
The rise of the Internet of Things (IoT) and Artificial Intelligence (AI) leads to the emergence of edge computing systems that push the training and deployment of AI models to the edge of networks for reduced bandwidth cost, improved responsiveness, and better privacy protection, allowing for the ubiquitous AI that can happen anywhere and anytime. Motivated by the above trend, this book introduces a new computing paradigm, the Social Edge Computing (SEC), that empowers human-centric edge intelligent applications by revolutionizing the computing, intelligence, and the training of the AI models at the edge. The SEC paradigm introduces a set of critical human-centric challenges such as the rational nature of edge device owners, pronounced heterogeneity of the edge devices, real-time AI at the edge, human and AI interaction, and the privacy of the edge users. The book addresses these challenges by presenting a series of principled models and systems that enable the confluence of the computing capabilities of devices and the domain knowledge of the people, while explicitly addressing the unique concerns and constraints from humans. Compared to existing books in the field of edge computing, the vision of this book is unique: we focus on the social edge computing (SEC), an emerging paradigm at the intersection of edge computing, AI, and social computing. This book discusses the unique vision, challenges and applications in SEC. To our knowledge, keeping humans in the loop of edge intelligence has not been systematically reviewed and studied in an existing book. The SEC vision generalizes the current machine-to-machine interactions in edge computing (e.g., mobile edge computing literature), and machine-to-AI interactions (e.g., edge intelligence literature) into a holistic human-machine-AI ecosystem.
With the continued improvements in computing power and digital information availability, we are witnessing the increasing use of high-performance computers to enhance simulations for the forecasting of hazards, disasters, and responses. This major reference work summarizes the theories, analysis methods, and computational results of various earthquake simulations by the use of supercomputers. It covers simulations in the fields of seismology, physical geology, earthquake engineering - specifically the seismic response of structures - and the socioeconomic impact of post-earthquake recovery on cities and societies. Individual chapters address phenomena such as earthquake cycles and plate boundary behavior, tsunamis, structural response to strong ground motion, and post-disaster traffic flow and economic activity. The methods used for these simulations include finite element methods, discrete element methods, smoothed particle hydrodynamics, and multi-agent models, among others.The simulations included in this book provide an effective bird's-eye view of cutting-edge simulations enhanced with high-performance computing for earthquake occurrence, earthquake damage, and recovery from the damage, combining three of the major fields of earthquake studies: earth science, earthquake engineering, and disaster-mitigation-related social science. The book is suitable for advanced undergraduates, graduates, and researchers in these fields.
Kubernetes is becoming the de-facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, youll learn hands-on recipes for automating the deployment, scaling, and operations of application containers across clusters of hosts.The book's easy-lookup problem-solution-discussion format helps you find the detailed answers you needquickly. Kubernetes lets you deploy your applications quickly and predictably, so you can efficiently respond to customer demand. This cookbook, ideal for developers and system administers alike, provides the essential knowledge you need to get there.Youll find recipes for:Kubernetes installationKubernetes API, API groupsApplication primitivesMonitoringTroubleshooting
Discover the power of SAP Integration Suite's capabilities with this hands-on guide. Learn how this integration platform (iPaaS) can help you connect and automate your business processes with integrations, connectors, APIs, and best practices for a faster ROI. Over the course of this book, you will explore the powerful capabilities of SAP Integration Suite, including API Management, Open Connectors, Integration Advisor, Trading Partner Management, Migration Assessment, and Integration Assessment. With detailed explanations and real-world examples, this book is the perfect resource for anyone looking to unlock the full potential of SAP Integration Suite. With each chapter, you'll gain a greater understanding of why SAP Integration Suite can be the proverbial swiss army knife in your toolkit to design and develop enterprise integration scenarios, offering simplified integration, security, and governance for your applications. Author Jaspreet Bagga demonstrates howto create, publish, and monitor APIs with SAP API Management, and how to use its features to enhance your API lifecycle. He also provides a detailed walkthrough of how other capabilities of SAP Integration Suite can streamline your connectivity, design, development, and architecture methodology with a tool-based approach completely managed by SAP. Whether you are a developer, an architect, or a business user, this book will help you unlock the potential of SAP's Integration Suite platform, API Management, and accelerate your digital transformation. What You Will Learn Understand what APIs are, what they are used for, and why they are crucial for building effective and reliable applicationsGain an understanding of SAP Integration Suite's features and benefits Study SAP Integration assessment process, patterns, and much moreExplore tools and capabilities other than the Cloud Integration that address the full value chain of the enterprise integration components Who This Book Is ForWeb developers and application leads who want to learn SAP API Management.
This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world.The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected. The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.
Für die IT- oder Cybersecurity von IT-Dienstleistungen (IT-Services) zu sorgen, kann ein komplexes Unterfangen sein. Als Anwender das erreichte Maß an IT-Sicherheit adäquat einzuschätzen nicht minder.Dieses Buch bringt Ordnung in das Dickicht von Prozessen, Aktivitäten und Informationen, indem neue Begriffe eingeführt sowie existierende geschärft und in den Zusammenhang gesetzt werden. Es liefert konkrete Anleitungen und ein Gesamtkonzept für das Management der IT-Service-Sicherheit im Sinne von Organisieren, Orchestrieren und Optimieren. Es zeigt, wie man die vielen Themen gleichzeitig bearbeiten und erfolgreich am internen oder externen Markt bestehen kann. Die Methoden und Konzeptionen sind die Essenz aus mehr als fünfzehn Jahren Forschung und Lehre und aus mehr als zwölf Jahren in zentraler Verantwortlichkeit in einem der großen international tätigen IT-Dienstleister. Die Aufteilung der an sich komplexen Materie in einzelne Begriffe ermöglicht es dem Leser, sich jeweils auf eine Fragestellung zu konzentrieren. Das Buch richtet sich an Anwender (Anwenderorganisationen) und an IT-Dienstleister (IT-Abteilungen und Firmen in der IT-Industrie) und ist hilfreich für Hersteller, die beide Parteien zufriedenstellen müssen.
"e;Smart City"e; programs and strategies have become one of the most dominant urban agendas for local governments worldwide in the past two decades. The rapid urbanization rate and unprecedented growth of megacities in the 21st century triggered drastic changes in traditional ways of urban policy and planning, leading to an influx of digital technology applications for fast and efficient urban management. With the rising popularity in making our cities "e;smart"e;, several domains of urban management, urban infrastructure, and urban quality-of-life have seen increasing dependence on advanced information and communication technologies (ICTs) that optimize and control the day-to-day functioning of urban systems. Smart Cities, essentially, act as digital networks that obtain large-scale real-time data on urban systems, process them, and make decisions on how to manage them efficiently. The book presents 26 chapters, which are organized around five topics: (1) Conceptual framework for smart cities and communities; (2) Technical concepts and models for smart city and communities; (3) Civic engagement and citizen participation; (4) Case studies from the Global North; and (5) Case studies from the Global South.
Master Infrastructure as Code (IaC) and streamline your DevOps workflows using Terraform and AnsiblePurchase of the print or Kindle book includes a free eBook in the PDF formatKey Features:Employ effective strategies and approach IaC projects efficiently by diving deep into its fundamentalsUnderstand the working of Terraform and Ansible and integrate them into your CI/CD workflowsWork with real-world examples of IaC across multiple cloud providers (Azure & AWS)Book Description:The Infrastructure as Code (IaC) approach ensures consistent and repeatable deployment of cloud-based IaaS/PaaS services, saving you time while delivering impeccable results. Infrastructure as Code for Beginners is a practical implementation guide that helps you gain a clear understanding of the foundations of Infrastructure as Code and make informed decisions when implementing it.With this book, you'll uncover essential IaC concepts, including planning, selecting, and implementing the right tools for your project. With step-by-step explanations and real-world examples, you'll gain a solid understanding of the benefits of IaC and the scope of application in your projects. You'll learn about the pros, cons, and best practices of different IaC tools such as Terraform and Ansible, and their use at different stages of the deployment process along with GitHub Actions. Using these tools, you'll be able to design, deploy, and secure your infrastructure on two major cloud platforms, Microsoft Azure and Amazon Web Services. In addition, you'll explore other IaC tools such as Pulumi, AWS CloudFormation, and Azure Bicep.By the end of this book, you'll be well equipped to approach your IaC projects confidently.What You Will Learn:Determine the right time to implement Infrastructure as Code for your workloadSelect the appropriate approach for Infrastructure-as-Code deploymentGet hands-on experience with Ansible and Terraform and understand their use casesPlan and deploy a workload to Azure and AWS clouds using Infrastructure as CodeLeverage CI/CD in the cloud to deploy your infrastructure using your codeDiscover troubleshooting tips and tricks to avoid pitfalls during deploymentWho this book is for:This book is for cloud engineers, software developers, or system administrators responsible for deploying resources to host applications. Ideal for both beginners and experienced professionals seeking to deepen their knowledge. Experience in manually deploying resources for applications in public clouds such as AWS or Microsoft Azure is a must. A basic understanding of programming or scripting languages, such as Python, Bash, PowerShell, etc. as well as familiarity with version control systems like Git, is a prerequisite.
This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.
This volume represents the 20th International Conference on Information Technology - New Generations (ITNG), 2023. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia. This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
A comprehensive guide to implementing Python applications in AWS while learning about key AWS servicesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain hands-on experience in AWS services to effectively implement Python programmingUtilize Python with open source libraries to develop data pipelines, APIs, and database applicationsLeverage the power of AWS to create a cloud-based server and use monitoring and logging featuresBook Description:AWS provides a vast variety of services for implementing Python applications, which can pose a challenge for those without an AWS background. This book addresses one of the more predominant problems of choosing the right service and stepping into the implementation of exciting Python apps using AWS.The book begins by showing you how to install Python and create an AWS account, before helping you explore AWS Lambda, EC2, Elastic Beanstalk, and S3 for Python programming. You'll then gain hands-on experience in using these services to build the Python application. As you advance, you'll discover how to debug Python apps using PyCharm, and then start deploying the Python applications on Elastic Beanstalk. You'll also learn how to monitor Python applications using the CloudWatch service, along with creating and publishing APIs on AWS to access the Python application. The concluding chapters will help you get to grips with storing unstructured and semi-structured data using NoSQL and DynamoDB, as well as advance your knowledge using the Glue serverless data integration service in AWS.By the end of this Python book, you'll be able to take your application development skills up a notch with AWS services and advance in your career.What You Will Learn:Understand the fundamentals of AWS services for Python programmingFind out how to configure AWS services to build Python applicationsRun and deploy Python applications using Lambda, EC2, and Elastic BeanstalkProvision EC2 servers on AWS and run Python applicationsDebug and monitor Python applications using PyCharm and CloudWatchUnderstand database operations on AWS by learning about DynamoDB and RDSExplore the API gateway service on AWS using Python to grasp API programmingWho this book is for:This book is for cloud developers, software developers, and IT specialists who want to develop Python applications on AWS as well as learn the concepts underlying AWS services for implementing the applications. Experience in Python programming is needed to be able to implement the applications on AWS.
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotsonan IBM senior technical staff membershows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.
Did you know that cloud computing is being used by just about every person or company on the internet today in some shape or form? Most people use the cloud and never even think about it. I've been writing, teaching and speaking about cloud computing since the time it was simply called "the cloud". In this book, you're going to learn how the cloud works, how it can help you, your team or organization, and the different types of cloud computing. In chapters 4 and 5, you're going to get a hands-on experience from my examples and learn real-world applications of cloud computing. In chapter 5 I'll show you:How to create and use a Microsoft Azure subscription to get $200 credit and 12 months of 25 free services.How to create a Windows virtual machine (VM).How to create a Linux virtual machine. When you read my book, you will understand different phrases and acronyms, such as:Software as a service Infrastructure as a service Platform as a service Virtualization Multitenancy and so much more! We'll also talk about:Public cloudsPrivate cloudsHybrid cloudsMulti-clouds Finally, we will look at the risks of cloud computing, cover the current marketplace and see a lot of the different companies offering cloud services. You will discover how to recognize and understand what it is these companies actually provide.
From the back cover Azure Security is a practical guide to the native security services of Microsoft Azure. You'll learn how to use Azure tools to improve your systems security and get an insider's perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. About the reader For software and security engineers building and securing Azure applications.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.